Command Injection Affecting io.jenkins.plugins:cryptomove package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-IOJENKINSPLUGINS-559574
  • published 10 Mar 2020
  • disclosed 9 Mar 2020
  • credit Wasin Saengow

Introduced: 9 Mar 2020

CVE NOT AVAILABLE CWE-78 Open this link in a new tab

How to fix?

There is no fixed version for io.jenkins.plugins:cryptomove.

Overview

io.jenkins.plugins:cryptomove is a Jenkins plugin that sources your keys and secrets stored on CryptoMove and runs a command with your keys and secrets available as environment variables with the name and value.

Affected versions of this package are vulnerable to Command Injection. As part of its build step configuration. It user with Job/Configure permission to execute an arbitrary OS command on the Jenkins master.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.8 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High